Unlock instant, AI-driven research and patent intelligence for your innovation.

Security operation management system, security operation management method, and security operation management program

a security operation and management system technology, applied in the field of security operation management system, security operation management method, and security operation management program, can solve the problems of difficult to describe a definition (definition of association between events), difficult to operate and manage various security tools and maintain system security,

Active Publication Date: 2013-07-09
NEC CORP
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention is a security operation management system, method, and program that can easily and comprehensively carry out security measures based on the changes in the system's state. This helps to consistently ensure the safety and security of the system.

Problems solved by technology

On the other hand, it is not easy to operate and manage various security tools and maintain the system security.
This is a major problem in security management for a multiplicity of organizations.
The vulnerability herein includes not only the vulnerability of software (for example, bugs) operated in the system, but also includes all incidents that bring about threats to the security.
This is because a security threat that can be ignored when a PC is used in an intranet needs to be handled when the PC is connected to the public Internet, since there may be attacks from malicious third parties around the world.
Therefore, in the method of delivering security countermeasures based on the predetermined association between the events and the actions, as in Related Art 1, it is difficult to describe a definition (definition of association between events and actions) for delivering an optimal countermeasure for each state.
It is difficult to comprehensively and consistently describe the definition of the association between the events and the actions including conditioning in accordance with the states.
Therefore, a formulation method and the like of rules that anticipate situations in which the optimal security countermeasures change depending on the states are not mentioned, and automatic switching of optimal security countermeasures cannot be carried out during operation of the managed system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security operation management system, security operation management method, and security operation management program
  • Security operation management system, security operation management method, and security operation management program
  • Security operation management system, security operation management method, and security operation management program

Examples

Experimental program
Comparison scheme
Effect test

first exemplary embodiment

(First Exemplary Embodiment)

[0050]Hereinafter, a first exemplary embodiment will be described with reference to the drawings.

[0051]FIG. 2 is a block diagram showing a configuration example of a security operation management system according to the first exemplary embodiment.

[0052]As shown in FIG. 2, the security management system according to the exemplary embodiment comprises state changing means 101 and action determining means 102.

[0053]State changing means 101 treats a detected state (specifically, incidence recognized as setting condition or vulnerability) of a managed system as an input, and based on state rules, searches (determines) a state after change as a target state if a state change is necessary.

[0054]Here, the state rule is information indicating a desired state of the managed system, and in the exemplary embodiment, is information indicated as a constraint equation related to predetermined variables (hereinafter, called state variables) allocated to diagnostic items ...

second exemplary embodiment

(Second Exemplary Embodiment)

[0093]Next, a second exemplary embodiment will be described.

[0094]FIG. 8 is a block diagram showing a configuration example of the security operation management system according to the second exemplary embodiment.

[0095]Compared to the first exemplary embodiment shown in FIG. 3, the security operation management system shown in FIG. 8 is different in that policy storing means 107, policy converting means 108, and model storing means 109 are included in place of state rule storing means 106.

[0096]Policy storing means 107 stores information indicating policy defining requirements for managed system 200 to carry out the security operation management (hereinafter, called policy information).

[0097]FIG. 9 is a diagram showing an example of the policy information stored in policy storing means 107 shown in FIG. 8.

[0098]In general, there are a plurality of requirements for managed system 200. In the exemplary embodiment, for example, as shown in FIG. 9, requireme...

third exemplary embodiment

(Third Exemplary Embodiment)

[0124]Next, a third exemplary embodiment will be described.

[0125]FIG. 12 is a block diagram showing a configuration example of the security operation management system according to the third exemplary embodiment.

[0126]Compared to the second exemplary embodiment shown in FIG. 8, the security operation management system shown in FIG. 12 is different in that current state storing means 110 is included.

[0127]Current state storing means 110 holds the current system state (values of state variables) of managed system 200.

[0128]In the exemplary embodiment, policy converting means 108 delivers the state rule by considering the condition of change, which is indicated by the current system state before the reception of an event indicated by current state storing means 110 and the current system state after change indicated by the event, and by considering the difficulty in handling.

[0129]To deliver such a state rule by policy converting means 108, types indicating ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a security management system for managing the security of a managed system including during operation of the managed system, the security management system comprising: state changing means for determining a state that satisfies a state rule, which defines a desired state of the managed system, as a target state if the state of the managed system does not satisfy the state rule; and action determining means for determining a predetermined process, which is for changing the difference between the state of the managed system when the target state is determined and the target state, as a countermeasure that needs to be carried out in the state of the managed system when the target state is determined.

Description

TECHNICAL FIELD[0001]The present invention relates to a security operation management system, a security operation management method, and a program for security operation management for managing the security of a managed system including during operation of the managed system.BACKGROUND ART[0002]As the dependency of system on the ICT (Information and Communication Technology) technique increases, the importance of information security is further increasing. Consequently, various security tools have been put into practical use in recent years, and a multiplicity of organizations keep implementing the security tools. On the other hand, it is not easy to operate and manage various security tools and maintain the system security. This is a major problem in security management for a multiplicity of organizations.[0003]An object of the security management is to carry out a countermeasure to vulnerability of security in accordance with the degree of risk. The vulnerability herein includes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L29/06G06F21/55G06F21/62
CPCG06F21/554G06F21/62H04L63/20
Inventor YANOO, KAZUOSAKAKI, HIROSHI
Owner NEC CORP